Sciweavers

1629 search results - page 3 / 326
» Infeasible Code Detection
Sort
View
WSE
2002
IEEE
14 years 19 days ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
EMNLP
2010
13 years 5 months ago
Improving Mention Detection Robustness to Noisy Input
Information-extraction (IE) research typically focuses on clean-text inputs. However, an IE engine serving real applications yields many false alarms due to less-well-formed input...
Radu Florian, John F. Pitrelli, Salim Roukos, Imed...
WCET
2007
13 years 9 months ago
Analysis of path exclusion at the machine code level
We present a method to find static path exclusions in a control flow graph in order to refine the WCET analysis. Using this information, some infeasible paths can be discarded ...
Ingmar Stein, Florian Martin
AI
2001
Springer
14 years 7 days ago
Imitation and Reinforcement Learning in Agents with Heterogeneous Actions
Reinforcement learning techniques are increasingly being used to solve di cult problems in control and combinatorial optimization with promising results. Implicit imitation can acc...
Bob Price, Craig Boutilier
IROS
2007
IEEE
144views Robotics» more  IROS 2007»
14 years 2 months ago
Faster and more accurate face detection on mobile robots using geometric constraints
— We develop a framework to allow generic object detection algorithms to exploit geometric information commonly available to robot vision systems. Robot systems take pictures wit...
Michael Dixon, Frederick Heckel, Robert Pless, Wil...